Zobrazeno 1 - 10
of 1 994
pro vyhledávání: '"disk encryption"'
Autor:
Donghoon Chang, Munawar Hasan
Publikováno v:
IEEE Access, Vol 12, Pp 84149-84168 (2024)
Committing security of authenticated encryption schemes is an emerging area and an active field of research and is highly motivated by real-world scenarios. CMT-4 security of authenticated encryption scheme is a security notion, where an adversary mu
Externí odkaz:
https://doaj.org/article/a1a70272c24c49f49981ed8c5b7695bf
Autor:
Georgii Firsov, Alisa Koreneva
Publikováno v:
Современные информационные технологии и IT-образование, Vol 18, Iss 3, Pp 691-701 (2022)
This research purpose is to develop a reduction-based method for analysis of cryptographic properties of block cipher modes of operation in context of full disk encryption (FDE) via provable security technique, to study weaknesses of widely spread am
Externí odkaz:
https://doaj.org/article/8779daff9b074be683523666799cdf10
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Sangwoo An, Seog Chung Seo
Publikováno v:
IEEE Access, Vol 10, Pp 25349-25357 (2022)
XTS-AES is a disk encryption mode of operation that uses the block cipher AES. Several studies have been conducted to improve the encryption speed using XTS-AES according to the increasing disk size. Among them, there are researches on parallel encry
Externí odkaz:
https://doaj.org/article/de2480d3590b4fe49667b64b4f9515ab
Autor:
Keisuke Inokuchi, Kenichi Kourai
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 9, Iss 1, Pp 1-22 (2020)
Abstract In Infrastructure-as-a-Service (IaaS) clouds, remote users access provided virtual machines (VMs) via the management server. The management server is managed by cloud operators, but not all the cloud operators are trusted in semi-trusted clo
Externí odkaz:
https://doaj.org/article/06efb39f3b5b4c6f9e8a76d196dcec7d
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2019, Iss 4 (2020)
We present two tweakable wide block cipher modes from doubly-extendable cryptographic keyed (deck) functions and a keyed hash function: double-decker and docked-double-decker. Double-decker is a direct generalization of Farfalle-WBC of Bertoni et al.
Externí odkaz:
https://doaj.org/article/d2691946e8bb404a86344e024d2ee44e
Autor:
Paul Crowley, Eric Biggers
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2018, Iss 4 (2018)
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the fastest options for hashing and stream encryption for processors without AES or other crypto instructions, with a provable quadratic advantage bound.
Externí odkaz:
https://doaj.org/article/f1dc249c33e744ba8252a5e0a5bc1466
Autor:
Kalibjian, Jeff
Telemetry data has great value, as setting up a framework to collect and gather it involve significant costs. Further, the data itself has product diagnostic significance and may also have strategic national security importance if the product is defe
Externí odkaz:
http://hdl.handle.net/10150/626950
http://arizona.openrepository.com/arizona/handle/10150/626950
http://arizona.openrepository.com/arizona/handle/10150/626950
Publikováno v:
IEEE Transactions on Computers. 70:1311-1324
The use of hardware encryption and new memory technologies such as phase change memory (PCM) are gaining popularity in a variety of server applications such as cloud systems. While PCM provides energy and density advantages over conventional DRAM mem